S.No | Title | Page No | Download |
IJIT 1 | CONSTANT INCREASE RATE DDOS ATTACKS DETECTION USING IP TRACE BACK AND INFORMATION DISTANCE METRICS Authors:VEMULA GANESH, B. VAMSI KRISHNA |
0001-0006 |
Download |
IJIT 2 | PROGRESSIVE MINING FRAME WORK USING REGULAR EXPRESSIONS Authors:CHERUKU SAKSHITH KUMAR, MALGIREDDY. SAIDI REDDY |
0007-0012 |
Download |
IJIT 3 | MIST OPERATION OF COMPUTERS: DETECTING INSIDE INFORMATION STEALING ATTACKS WITH IN THE CLOUD Authors:T.SHYAM KUMAR, M.PAVAN KUMAR |
0013-0018 |
Download |
IJIT 4 | REGRESSION TESTING OF MUTATION BASED UNIT TEST CASES IN OOP Authors:T.SHYAM KUMAR, M.PRIYANKA |
0019-022 |
Download |
IJIT 5 | AN EFFICIENT SYSTEM FOR HUNTING REGULAR EXPRESSION Authors:TATIREDDY HARATHI, G.S. PRAVEEN KUMAR |
0023-0029 |
Download |
IJIT 6 | PROTECTED DATA FORWARDING BY ERASURE CODING TO CLOUD STORAGE SYSTEM Authors:Mr.YOGESH B. AMANE, Mr. RAHUL S. KADAM |
0030-0035 |
Download |
IJIT 7 | PROTECTED DATA FORWARDING BY ERASURE CODING TO CLOUD STORAGE SYSTEM Authors:P. CHANDU, DNVSLS INDIRA |
0036-0041 |
Download |
IJIT 8 | A NOVEL APPROACH TO REDUCE FALSE POSITIVES IN SPAM ZOMBIE DETECTION SYSTEMS Authors:MADHUBABU NALLURI, M.VAZRALU |
0042-0047 |
Download |
IJIT 9 | LOW BANDWIDTH DDOS ATTACK DETECTION IN THE NETWORK Authors:L. SHIVAKUMAR, 2G. ANIL KUMAR |
0054-0059 |
Download |
IJIT 10 | POWER FLOW CONTROL OF UPFC IN A POWER SYSTEMS Authors:BHUPESH DESHMUKH, DHANESHWARI SAHU |
0060-0065 |
Download |
IJIT 11 | Compressive Sensing Detection method for Frequency Hopping Signals Authors:P.DEVA, M. SHIVAPRASAD |
0066-0069 |
Download |
IJIT 12 | Enhanced ACO on Demand Routing Protocol for MANET’s Authors:B. SUKUMAR BABU, R. R. TEWARI, NUPOOR GOEL |
0070-0072 |
Download |
IJIT 13 | Optimum Solution for Weighted Sum Rate Maximization in Gaussian Broadcast Authors:PRAGADA MOHAN RAO, K.KISHAN RAO |
0073-0077 |
Download |
IJIT 14 | PROACTIVE PENETRATION TESTING FRAMEWORK FOR FINDING UNKNOWN VULNERABILITIES Authors:KUDIKALA SATHYANARAYANA, MADDURU SAMBASIVUDU |
0078-0082 |
Download |
IJIT 15 | ANOMALY INTRUSION DETECTION SYSTEM USING ACCESS METRICS Authors:A. NAVEEN KUMAR, K. KAILASA RAO |
0083-0088 |
Download |
IJIT 16 | Review of Technical Challenges and Business Impact of Software Defined Networks in Feature Networks and Services Authors:CHINTHAGUNTA MUKUNDHA, DR. MOHAMMAD VAMMANLI, DR. MOHAMMAD LALTWSOL |
0089-0095 |
Download |